We address the problem of publishing parliamentary proceedings in a digital sustainable manner. We give an extensive requirements analysis, and based on that propose a uniform XML...
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
Typically, autonomous believable agents are implemented using static, hand-authored reactive behaviors or scripts. This hand-authoring allows designers to craft expressive behavio...
Peng Zang, Manish Mehta, Michael Mateas, Ashwin Ra...
Tool use often challenges the human motor system, especially when these tools require sensorimotor transformations. We report an experiment using a digitizer tablet, in which diff...
Mammography is the best method for early mass detection. In order to limit the search for abnormalities by Computer Aided Diagnosis systems to the region of the breast without und...
Hengameh Mirzaalian, Mohammad Reza Ahmadzadeh, Sae...